0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Advances in Information and Computer Security - 18th International Workshop on Security, IWSEC 2023 Yokohama, Japan, August... Advances in Information and Computer Security - 18th International Workshop on Security, IWSEC 2023 Yokohama, Japan, August 29–31, 2023 Proceedings (1st ed. 2023)
Junji Shikata, Hiroki Kuzuno
R1,745 Discovery Miles 17 450 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 18th International Workshop on Security, IWSEC 2023, which took place as a hybrid event in Yokohama, Japan, during August 29–31, 2023. The 14 full papers presented in this book were carefully reviewed and selected from 47 submissions. They were organized in topical sections as follows: System and Hardware Security; Symmetric Key Cryptography; Public Key Cryptography; Zero Knowledge Proofs; and Card Based Cryptography.

Public-Key Cryptography - PKC 2022 - 25th IACR International Conference on Practice and Theory of Public-Key Cryptography,... Public-Key Cryptography - PKC 2022 - 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part I (Paperback, 1st ed. 2022)
Goichiro Hanaoka, Junji Shikata, Yohei Watanabe
R2,752 Discovery Miles 27 520 Ships in 18 - 22 working days

The two-volume proceedings set LNCS 13177 and 13178 constitutes the refereed proceedings of the 25th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2022, which took place virtually during March 7-11, 2022. The conference was originally planned to take place in Yokohama, Japan, but had to change to an online format due to the COVID-19 pandemic.The 40 papers included in these proceedings were carefully reviewed and selected from 137 submissions. They focus on all aspects of public-key cryptography, covering cryptanalysis; MPC and secret sharing; cryptographic protocols; tools; SNARKs and NIZKs; key exchange; theory; encryption; and signatures.

Public-Key Cryptography - PKC 2022 - 25th IACR International Conference on Practice and Theory of Public-Key Cryptography,... Public-Key Cryptography - PKC 2022 - 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part II (Paperback, 1st ed. 2022)
Goichiro Hanaoka, Junji Shikata, Yohei Watanabe
R2,494 Discovery Miles 24 940 Ships in 18 - 22 working days

The two-volume proceedings set LNCS 13177 and 13178 constitutes the refereed proceedings of the 25th IACR International Conference on Practice and Theory of Public Key Cryptography, PKC 2022, which took place virtually during March 7-11, 2022. The conference was originally planned to take place in Yokohama, Japan, but had to change to an online format due to the COVID-19 pandemic.The 40 papers included in these proceedings were carefully reviewed and selected from 137 submissions. They focus on all aspects of public-key cryptography, covering cryptanalysis; MPC and secret sharing; cryptographic protocols; tools; SNARKs and NIZKs; key exchange; theory; encryption; and signatures.

Information Theoretic Security - 10th International Conference, ICITS 2017, Hong Kong, China, November 29 - December 2, 2017,... Information Theoretic Security - 10th International Conference, ICITS 2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings (Paperback, 1st ed. 2017)
Junji Shikata
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th International Conference on Information Theoretic Security, ICITS 2017, held in Hong Kong, China, in November/December 2017. The 12 full papers were carefully reviewed and selected from 42 submissions. They are organized around the following topics: quantum cryptography; quantum information theory; post-quantum cryptography (e.g. lattices and cryptography); physical layer security; wiretap channels; adversarial channel models; cryptography from noisy channels; bounded storage models; network coding security; biometric security; randomness extraction; key and message rates; secret sharing; authentication codes; multiparty computations; information theoretic reductions; and implementation challenges.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Dala Tempera Paint Block - Pearl Green…
R26 Discovery Miles 260
Boss' Secret Baby - A Billionaire's…
Michelle Love Hardcover R606 Discovery Miles 6 060
Faber-Castell Gelatos Water Soluble…
R489 Discovery Miles 4 890
The Book of Small
Emily Carr Hardcover R625 Discovery Miles 6 250
The Sabbath Viewed in the Light of…
James Gilfillan Paperback R747 Discovery Miles 7 470
Dear Waheed - A mother’s legacy of love…
Farhana Yunnus Paperback R290 R220 Discovery Miles 2 200
Masked Indulgence - A Billionaire…
Michelle Love Hardcover R659 Discovery Miles 6 590
Dala Tempera Paint Block - Pearl Yellow…
R26 Discovery Miles 260
Dala Glitter Liner - Green (30ml) - for…
R22 Discovery Miles 220
Captain America
Jack Kirby, Joe Simon, … Paperback R672 R595 Discovery Miles 5 950

 

Partners